The economics of cybersecurity for the undecided

Buyers rarely use all the information necessary to evaluate the utility of a particular good or service even when it’s accessible, but in most cases, they do not possess even a fraction of the information available to the vendors.

This information imbalance means that the buyers of antivirus software are placing themselves in the precarious safekeeping of invisible market forces or, even worse, at the mercy of market-dominant vendors. Consumers who don’t like this setup either buy cheaper products (thus reducing the risk of overpaying for a product with qualities they’re unable to evaluate) or postpone the decision to purchase until more information is available.

On the flip side of this conundrum is the cost of doing nothing, a pervasive concept despite its counterintuitive name. In the context of cybersecurity, this means that the decision not to buy antivirus software might end up costing way more than a single-seat license if a CryptoLocker clenches all of your data, photos and correspondence.

The value of a cybersecurity solution

It is precisely because of this concept of the cost of doing nothing that we’re able to determine the value of a cybersecurity solution. Helping you estimate the aforementioned cost is a measure known as ‘Value at Risk’ (VaR), the probability that a specific loss will occur within a specific timeframe.

“HELPING YOU ESTIMATE THE COST OF DOING NOTHING IS VALUE AT RISK, THE PROBABILITY THAT A SPECIFIC LOSS WILL OCCUR WITHIN A SPECIFIC TIMEFRAME.”

For example, after looking at a certain set of statistics, you might conclude there is a 1% chance that within a year a DDoS attack will disable your online business for one day, leading to a loss of profit of $10,000. If the management of your company finds this risk acceptable, there’s no need to invest in appropriate security measures (but if misfortune strikes, nobody has the right to say they didn’t see it coming).

VaR is never zero even for typical PC users. They risk their data every time they go online, as confirmed by antivirus software logs that record malware incidents prevented by security software, or by tools like ESET’s Virus Radar.

Accepting and aggravating the risk

As it became increasingly obvious that the risk of a malware infection can never be 100% avoided regardless of the time and money invested, the usually upbeat attitude of the internet community turned sour.

At one point, former senior vice president for information security at Symantec, Brian Dye, went so far as to make the oft-repeated claim that antivirus software is dead. His argument was based on the hotly debated assertion that almost all cyber damage is caused by the so-called “zero-day” attacks that exploit vulnerabilities unknown to the developers and antivirus vendors.

According to Dye, security software performs significantly worse against such attacks, and as soon as they’re discovered, cybercriminals move on to the next exploitable flaw, making protection from those attacks obsolete. However, even if we take this argument at face value, anti-malware still stops some “zero-day” attacks, which is better than nothing.

In fact, much better: if we were to trust Dye’s numbers, commercial anti-malware stops 45% of such previously unknown attacks. Besides, the attitude of IT professionals who consider anti-malware redundant is not based on recklessness, but on efficient backup and recovery procedures: their files are safe either way.

This is not the case when it comes to typical users, who account for a decent share of security breaches.

“NOT ONLY DO USERS TEND TO FALL FOR ‘SOCIAL ENGINEERING’ TRAPS, BUT SOMETIMES RUN STRAIGHT THROUGH THE RED LIGHTS.”

Not only do they tend to fall for “social engineering” traps, but sometimes run straight through the red lights. A study by the Carnegie Mellon University School of Computer Science found that 21% of tested users ignored active phishing warnings in their web browsers. The authors of a Microsoft Research study of password habits estimated that 0.4% of internet users type in their passwords at verified phishing sites. That certainly doesn’t sound like much, but the consequences can be dire, as was the case with the recent hacking of US Democratic National Committee systems.

Attackers, allegedly from Russia, mimicked the domains of targeted organizations and tricked victims into entering their credentials. According to the FBI report, “at least one targeted individual activated links to malware hosted on operational infrastructure of [sic] opened attachments containing malware”, while others were tricked into disclosing their passwords to a fake webmail domain hosted on the attacker’s infrastructure.

Making it harder for the rest of us

Whether you’re a business or home user, your attitude towards security affects the whole network, because your IT resources can be used to propagate threats and cause damage to other users located anywhere in the world. This is where estimates on global damage from malware come into play.

Inga Beale, CEO of Lloyds, said that cyberattacks cost business worldwide as much as $400 billion in 2015, and a joint study by IBM and Ponemon Institute surveying 350 companies around the world that experienced a data breach in 2015 indicated that the average cost of such incidents amounted to $3.79 million – a total cost of over $1.3 billion for that sample set alone.

No matter how much one downplays the value of security software, the discrepancy between the total estimated damage caused by malware and the money spent on anti-malware solutions globally is still huge: in 2015, all security software vendors generated combined revenues of approximately $22 billion, or roughly 5% of the estimated cost caused by all cyberattacks. Since cybercriminals show no signs of relenting – according to some estimates, damages caused by malware could reach $2.1 trillion by 2019 – it is no wonder that in certain cases, taking cybersecurity risks is no longer allowed by law.

Cybersecurity ceases to be a private matter

Cybersecurity has been a part of the global legislative agenda for some time. In 2007, the European Union, although a bit at odds over how to define what qualifies as cybercrime, communicated the need for “a general policy on the fight against cybercrime”.

In accordance with this policy, the General Data Protection Regulation, which is scheduled to come into force in May 2018, increases the penalties for institutions handling private data that fail to implement appropriate cyber security measures.

“IF YOUR COMPANY DECIDES TO DITCH THE IT SECURITY REQUIREMENTS MANDATED BY LAW, IT LEAVES ITSELF OPEN TO PENALTIES AND LAWSUITS.”

Government regulation of cybersecurity can be seen as unjust dumping of IT security costs on the private sector. However, as Ross Anderson of the University of Cambridge noted in his EdX course, the trouble is that the incentives for securing the respective public services just aren’t there: most of the time, cybercrime comes down to a series of petty thefts – a couple of hundred dollars here, a couple of hundred dollars there – and remains under the police radar.

In addition, perpetrators of cybercrime are often located in a different jurisdiction and therefore inaccessible to the local law enforcement agencies. Whether this shifting of responsibility for cybersecurity is justified or not, it has become an inevitable circumstance that adds to the cost of business – if your company decides to ditch the IT security requirements mandated by law, it leaves itself open to penalties and lawsuits.

Finally, how much should you invest?

In their 2002 paper The Economics of Information Security Investment, Lawrence Gordon and Martin Loeb of the University of Maryland estimated that in most cases, optimal investment in information security is less or equal to 36.97% of the loss expected in the absence of security.

An important thing to remember is that firewalls and antivirus software are only a part of the solution (and Gordon and Loeb’s 36.97%). If you want your company secure, you need user training, awareness campaigns and a set of preemptive and corrective measures. Therefore, Gordon and Loeb’s figure represents the total cost of all cybersecurity products and activities that your company should implement if it wants to effectively mitigate respective risks.

As far as individual users are concerned, it’s interesting to look at how much people tend to pay to rescue their IT resources when they have to. According to a report by IBM, almost 40% of consumers would be willing to pay more than $100 to get data back, and most ransomware fetches over $300 per victim.

The paradox here is that typical users usually don’t know how much they’re willing to pay before a security incident happens, so the realization that it might have been worth paying $50 to prevent a cost of $300 often comes too late.

Whatever you choose to do as an individual user, bear in mind that rudimentary antivirus solutions can be installed free of charge, regular software patches don’t cost anything, and basic data backup can be arranged at a cost of a single USB stick that you probably already have – in other words, basic implementation of the three key aspects of PC security doesn’t have to cost you anything at all.

Ultimately, there are two ways of deciding what to do about cybersecurity. The first is to check the regulatory requirements that apply to your business, estimate your VaR and the inconvenience of restoring your systems and weigh these against the cost of a security solution.

“BASIC IMPLEMENTATION OF THE THREE KEY ASPECTS OF PC SECURITY DOESN’T HAVE TO COST YOU ANYTHING.”

Alternatively, you can simply place your trust in the market for cybersecurity solutions and services, which is expected to grow from $75 billion in 2015 to $170 billion in 2020. It’s not that conformism is a particularly sound approach when it comes to making strategic decisions, but before you beg to differ, make sure you know why and what to do if you turn out to be wrong.

(Miroslav Nikolac is Business Development Executive at ESET, Croatia. This post has been reproduced from WeLiveSecurity).

Related Articles

By Rick Rogers “You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.” R. Buckminster Fuller said those words decades ago, but they […]

Like this:

In response to the cyber environment posing security challenges to major sporting and other public events, global cyber experts recently met with Qatar’s Supreme Committee for Delivery & Legacy to develop and implement best practices […]

Like this:

Cloud computing is essential to most of today’s businesses’ network inventory because it helps them run more efficiently. Not long ago, it was thought that only large companies benefited from cloud computing, but the fact […]

Leave a Reply

Be the first to comment

Specify a Disqus shortname at Social Comments options page in admin panel

advert:

About us:

For news, updates, views, analyses and reviews on tech and ICT developments in Kenya, Africa and the world.
For editorial and advertising partnerships, call +254-725-537823 / +254-735-537823 or send an email to aptantech@gmail.com or omondi.ouma@gmail.com.
We also provide Press Release writing and distribution services to local and regional news outlets. Don't hesitate to contact us for media coordination when you've an event.

Advert Dimensions:

For Advertising inquiries:

Above – click on the image for clarity – are the various advert placement positions and dimensions on the blog. For bookings and more info, get in touch through: +254-725-537823 / +254-735-537823 or send an email to: aptantech@gmail.com or omondi.ouma@gmail.com.